Slashdot videos: Now with more Slashdot!

View

Discuss

Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

ozmanjusri writes "New smartphones may be lightweight, compact objects, but their OSs are anything but. Ice Cream Sandwich will need workstations with no less than 16 GB RAM to build the source code, twice the amount Gingerbread needed. It will take 5 hours to compile on a dual quad-core 2+GHz workstation, and need 80GB disk space for all AOSP configs. Android developers are also being warned to be cautious of undocumented APIs: 'In almost every case, there's only one reason for leaving APIs undocumented: We're not sure that what we have now is the best solution, and we think we might have to improve it, and we're not prepared to make those commitments to testing and preservation. We're not claiming that they're "Private" or "Secret" — How could they be, when anyone in the world can discover them? We're also not claiming they're forbidden: If you use them, your code will compile and probably run.'"

An anonymous reader writes "I just tried to install Subsystem for UNIX-based Applications (SUA) on Windows 8 Preview and found that it's marked as DEPRECATED: 'Subsystem for UNIX-based Applications (SUA) is a source-compatibility subsystem for compiling and running custom UNIX-based applications and scripts on a computer running Windows operating system. WARNING: SUA is deprecated starting with this release and will be completely removed in the next release. You should begin planning now to employ alternate methods for any applications, code, or usage that depend on this feature.'"

The 13,000 sq mile U.S. Radio Quiet Zone is an area in West Virginia where all wireless transmissions are banned because of the large number of radio telescopes located there. (This official page shows a map of the Zone; an old Wired article is fascinating reading.) These high-tech telescopes have attracted unlikely neighbors, people who claim to have Wi-Fi allergies. In recent years, scores of people have moved to the area to escape the "damage" that electromagnetic fields can cause them. From the article: "Diane Schou is unable to hold back the tears as she describes how she once lived in a shielded cage to protect her from the electromagnetic radiation caused by waves from wireless communication. 'It's a horrible thing to have to be a prisoner,' she says. 'You become a technological leper because you can't be around people. It's not that you would be contagious to them — it's what they're carrying that is harmful to you.'"

An anonymous reader writes "Researchers from University College Dublin have conducted an analysis of anonymity on Bitcoin, and found it is not inherently anonymous, and that in many cases, users and their transactions can be identified. They use techniques such as context discovery and flow analysis to investigate and visualize an alleged theft of Bitcoins, which, at the time of the theft, had a market value of approximately half a million U.S. dollars."

doperative writes with this quote from El Reg:
"Microsoft has nailed a second Android device maker to a patent licensing agreement. The Redmond software giant announced on Monday that General Dynamics Itronix has signed a patent agreement that will provide 'broad coverage under Microsoft's patent portfolio.' In other words, General Dynamics Itronix has agreed to licensing certain, unnamed Microsoft patents for use with Android-powered portables."

cardoni writes "Dan Yoder, CTO at Border Stylo, offers insights on the current state of simultaneous iPhone / Android development using PhoneGap and his thoughts on the debate over native apps versus Web apps. Quoting: 'One problem with the debate is that it’s a false dichotomy, since you can embed a Web browser within a native application. And, conversely, you can extend an embedded Web browser to provide access to native APIs. The two alternatives have not been mutually exclusive for years now. And, focusing on the strengths of native applications ignores the benefits of Web applications. For example, there’s the appeal of writing code that will run on a variety of different devices, ranging from mobile phones, to tablets, to laptops, even to gaming consoles. Virtually every major device platform now sports a Web browser, and it can often be discreetly embedded within a native application. To boot, much of this code can be tested using a Web browser, which enables more easily automated testing. It’s also easier to find Web developers than it is to find native developers.'"

An anonymous reader writes "A device created by the University of Tokyo and Sony Laboratories called PossessedHand allows researchers to control a subject's hand via electrical stimulation. While currently being used to teach students to play the koto, a Japanese traditional stringed instruments, just imagine the possibilities! Twilight Zone anyone?"

Endoflow2010 writes "Apple on Tuesday started selling an unlocked version of its iPhone 4, starting at $649. A 16GB unlocked iPhone 4 will set you back $649, while a 32GB version is selling for $749. Both are available in black or white; the black will ship within one to three business days, while the white is available in three to five days, according to the Apple Web site. The benefit of an unlocked phone is that you are not locked into a two-year contract with a particular provider. But it also means that you don't get the subsidized pricing provided by someone like AT&T or Verizon. The same phones with a contract cost $199 and $299."

An anonymous reader writes "AT&T is sending warning notifications to jailbroken iPhone users who use unofficial tethering methods like MyWi and PDANet. 'Customers are being notified that their service plans need updating to subscribe to a tethering plan, and that they will be automatically subscribed to a DataPro 4GB package that costs an additional $45 per month if they continue to tether.'"

Orome1 writes "A US court has heard that a couple conned at least $6 million from the great-grandson of an oil industry tycoon after he brought his virus-infected computer in for repair. The couple are said to have tricked the composer into believing that, while investigating the virus, they had found evidence that his life was in danger – concocting a story that the virus had been tracked to a hard drive in Honduras, and that evidence had been found that the composer's life was in danger." The victim here, Roger Davidson, may have lost as much as $20 million, after being convinced that he was in danger from a grand conspiracy. Vickram Bedi and girlfriend Helga Invarsdottir convinced Davidson to pay $160,000 monthly, and possibly much more, for their help.

ByOhTek writes "CNN reports that in July, rocker Ozzy Osbourne became one of few to submit his blood to have his full genome sequenced and analyzed. The results are in, and it turns out his genome reveals some Neanderthal lineage. What does Ozzie have to say about it? 'I was curious, given the swimming pools of booze I've guzzled over the years - not to mention all of the cocaine, morphine, sleeping pills, cough syrup, LSD, Rohypnol... there's really no plausible medical reason why I should still be alive. Maybe my DNA could say why,' he wrote."